General

  • Target

    47f58f0fd6e44f0cde69b3e3ce6d33106dfd31dff716d7679d4d72936cd46db4

  • Size

    3.4MB

  • Sample

    220521-eaj7pscbbn

  • MD5

    02bd574acaf76417979a5f5fbb96d15c

  • SHA1

    342c23c79889441ce03c98ed243cbf417702e7bd

  • SHA256

    47f58f0fd6e44f0cde69b3e3ce6d33106dfd31dff716d7679d4d72936cd46db4

  • SHA512

    ba0332666e6f6a0b66de3673e7e6e0862db57e0d328edf2e53c1386ca55e6b3dcaa03f329397491eb5bb1576a6525d237f6c89804d78aec8a81fb149899b9717

Malware Config

Targets

    • Target

      47f58f0fd6e44f0cde69b3e3ce6d33106dfd31dff716d7679d4d72936cd46db4

    • Size

      3.4MB

    • MD5

      02bd574acaf76417979a5f5fbb96d15c

    • SHA1

      342c23c79889441ce03c98ed243cbf417702e7bd

    • SHA256

      47f58f0fd6e44f0cde69b3e3ce6d33106dfd31dff716d7679d4d72936cd46db4

    • SHA512

      ba0332666e6f6a0b66de3673e7e6e0862db57e0d328edf2e53c1386ca55e6b3dcaa03f329397491eb5bb1576a6525d237f6c89804d78aec8a81fb149899b9717

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks